PP Christian
Staff member
We are replacing a few servers because of the many blocked ips, Amsterdam has already been replaced, the 4 that are now offline will also be replaced as soon as the hosters have delivered them complete with ips.
As far as I am correctly informed, new hardware is also being used.Or is is also some Hardware-Upgrade?
# openvpn --config Nuremberg2.conf --script-security 2 --route remote_host --persist-tun --up updown.sh --down updown.sh --route-noexec --setenv hopid 2 --setenv prevgw 10.4.99.1
2024-11-20 18:16:11 Multiple --up scripts defined. The previously configured script is overridden.
2024-11-20 18:16:11 Multiple --down scripts defined. The previously configured script is overridden.
2024-11-20 18:16:11 --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2024-11-20 18:16:11 WARNING: file 'client.key' is group or others accessible
2024-11-20 18:16:11 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jun 27 2024
2024-11-20 18:16:11 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2024-11-20 18:16:11 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2024-11-20 18:16:11 TCP/UDP: Preserving recently used remote address: [AF_INET]80.255.10.194:4433
2024-11-20 18:16:11 UDP link local: (not bound)
2024-11-20 18:16:11 UDP link remote: [AF_INET]80.255.10.194:4433
2024-11-20 18:16:11 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1617', remote='link-mtu 1633'
2024-11-20 18:16:11 WARNING: 'keysize' is used inconsistently, local='keysize 128', remote='keysize 256'
2024-11-20 18:16:11 [Server_nuremberg.perfect-privacy.com] Peer Connection Initiated with [AF_INET]80.255.10.194:4433
2024-11-20 18:16:13 AUTH: Received control message: AUTH_FAILED
2024-11-20 18:16:13 SIGTERM[soft,auth-failure] received, process exiting
root@comp:/home/user/vpn/PP/udp#
I'm having issues with London2 VPN, it says certificate verify failed.
Here is my log: https://pomf2.lain.la/f/mtxc91xa.txt
2024-11-25 17:07:30 VERIFY ERROR: depth=0, error=certificate has expired: C=CH, ST=Zug, O=Perfect Privacy, CN=Server_london.perfect-privacy.com, emailAddress=admin@perfect-privacy.com, serial=14998562583678579446
2024-11-25 17:07:30 OpenSSL: error:0A000086:SSL routines::certificate verify failed
2024-11-25 17:07:30 TLS_ERROR: BIO read tls_read_plaintext error
2024-11-25 17:07:30 TLS Error: TLS object -> incoming plaintext read error
2024-11-25 17:07:30 TLS Error: TLS handshake failed
2024-11-25 17:07:30 SIGUSR1[soft,tls-error] received, process restarting
2024-11-25 17:07:35 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2024-11-25 17:07:35 TCP/UDP: Preserving recently used remote address: [AF_INET]82.199.130.34:443
2024-11-25 17:07:35 TCP/UDP: Preserving recently used remote address: [AF_INET]82.199.130.34:443
2024-11-25 17:07:35 UDP link local: (not bound)
2024-11-25 17:07:35 UDP link remote: [AF_INET]82.199.130.34:443
^C2024-11-25 17:07:35 event_wait : Interrupted system call (code=4)
2024-11-25 17:07:35 SIGINT[hard,] received, process exiting
I can repeat it again here. We are of course working on getting the servers in order. We are not as well staffed as the popular providers, but we offer the highest standards in terms of security. Better a server offline than possibly insecure connections. We have proven this impressively in more than 15 years. Nevertheless, we can understand the annoyance when individual servers fail. That annoys us too, of course. Sometimes it takes a little longer for the admins in the data centres to process our tickets properly. If they make mistakes there, the servers don't work according to our requirements. And in case of doubt, that's better than if the security is patchy, to put it simply.This is a disaster, and it seems like they don’t even care. Someone is active on the German part of the forum, but nothing is being done.
# amsterdam2u
2024-11-30 15:49:41 Multiple --up scripts defined. The previously configured script is overridden.
2024-11-30 15:49:41 Multiple --down scripts defined. The previously configured script is overridden.
2024-11-30 15:49:41 --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2024-11-30 15:49:41 WARNING: file 'client.key' is group or others accessible
2024-11-30 15:49:41 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jun 27 2024
2024-11-30 15:49:41 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2024-11-30 15:49:41 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2024-11-30 15:49:41 TCP/UDP: Preserving recently used remote address: [AF_INET]212.7.209.236:44
2024-11-30 15:49:41 UDP link local: (not bound)
2024-11-30 15:49:41 UDP link remote: [AF_INET]212.7.209.236:44
^C2024-11-30 15:51:36 event_wait : Interrupted system call (code=4)
2024-11-30 15:51:36 SIGINT[hard,] received, process exiting
root@comp:~# amsterdam3u
2024-11-30 15:46:59 Multiple --up scripts defined. The previously configured script is overridden.
2024-11-30 15:46:59 Multiple --down scripts defined. The previously configured script is overridden.
2024-11-30 15:46:59 --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2024-11-30 15:46:59 WARNING: file 'client.key' is group or others accessible
2024-11-30 15:46:59 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jun 27 2024
2024-11-30 15:46:59 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2024-11-30 15:46:59 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2024-11-30 15:46:59 TCP/UDP: Preserving recently used remote address: [AF_INET]212.7.209.237:44
2024-11-30 15:46:59 UDP link local: (not bound)
2024-11-30 15:46:59 UDP link remote: [AF_INET]212.7.209.237:44
2024-11-30 15:48:59 [UNDEF] Inactivity timeout (--ping-restart), restarting
2024-11-30 15:48:59 SIGUSR1[soft,ping-restart] received, process restarting
2024-11-30 15:49:04 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2024-11-30 15:49:04 TCP/UDP: Preserving recently used remote address: [AF_INET]212.7.209.237:44
2024-11-30 15:49:04 TCP/UDP: Preserving recently used remote address: [AF_INET]212.7.209.237:44
2024-11-30 15:49:04 UDP link local: (not bound)
2024-11-30 15:49:04 UDP link remote: [AF_INET]212.7.209.237:44
^C2024-11-30 15:49:21 event_wait : Interrupted system call (code=4)
2024-11-30 15:49:21 SIGINT[hard,] received, process exiting